chicagoland_2013_10_racf_update
chicagoland_2013_10_racf_update
chicagoland_2013_10_racf_update
RACDCERT Enhancements
New and improved RACF Health Checks
RACF_AIM_STAGE
RACF_UNIX_ID
RACF_CERTIFICATE_EXPIRATION
RACF_SENSITIVE_RESOURCES
Certificate issuer distinguished name, subject distinguished names and signature algorithms, in
IRRDBU00 output
3
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Common Criteria Update
4
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Common Criteria Update
●
Recent Common Criteria Evaluations of Interest:
5
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RRSF
6
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RRSF: Quick TCP/IP Review
●
Starting with z/OS V1.13, you can link RRSF nodes using TCP/IP
instead of APPC! This means that you can now:
Manage your RRSF network using the same skills as the rest of your
TCP/IP network.
Ensure that the same network security policy (IDS, IPS, etc.) is in place for
your RRSF network as in place for the rest of your z/OS TCP/IP network.
7
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RRSF: IPv6 Support
●
Starting with z/OS V2.1, RACF plans on changing RRSF so that it
supports the use of TCP/IP V6 for communications between/among
your RRSF nodes
●
Once the z/OS Communications Server on your local note is
configured for Ipv6:
●
IPv6-format addresses will be displayed
●
You do not have to migrate to IPv6 all at once: Some“remote” nodes
can be IPv4 and some IPv6.
8
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RRSF: IPv6 Addresses
Description IPv4 IPv6
Address length 32 bits long (4 bytes) 128 bits long (16 bytes).
64 bits for network number, 64 bits for host numbe
11
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RRSF: Comments in Parameter Library
Prior to z/OS V2.1, blank lines or whole-line comments would result
in an IRRC003I (“COMMAND xxxxx IS NOT VALID”) error message
With z/OS V2.1, blank lines and whole-line comments are allowed
A whole-line comment begins with “//” in any column
Continuation characters at the end of a whole-line comment does
not continue the comment
Whole-line comments or blank lines may not be placed within a
continued command
Down-level systems will continue to flag whole-line and blank lines
as errors
Examples of valid whole-line comments:
//This is a comment line
// This is a comment line
// define the local node with a socket listener
12
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RRSF: TLS 1.2 Cipher Suite Support
RRSF uses Application Transparent Transport Layer Security (AT-
TLS) to encrypt data between RRSF nodes
AT-TLS supports more cryptography suites in z/OS V2.1
Certificates are used in AT-TLS to provide secure connections between
RRSF systems using TCP/IP
In z/OS V2R1, ECC certificates with stronger encryption may be used
All cryptography suites in Transport Layer Security (TLS) Protocol
Version 1.2 are supported
13
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RACDCERT
14
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RACDCERT ADD Enhancement
Starting in V2R1 RACF is adding function to help manage certificate
chains.
RACDCERT ADD certificate chain enhancement:
When importing a PKCS#12 or PKCS#7 certificate chain using the
RACDCERT ADD command, only the end entity certificate can be
named using a specified label.
RACDCERT generates labels for the rest of the certificates in the
chain, but previously did not display what labels had been added.
Starting in V2R1, RACDCERT will display the generated labels of any
certificates in the chain that were added.
RACDCERT ID(COOPER) ADD('COOPER.CERTS.MYPKCS12') WITHLABEL(‘MyCert’)
15
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RACDCERT LISTCHAIN
Starting in V2R1 RACF is adding the ability to list a certificate chain
with the introduction of the RACDCERT LISTCHAIN command.
RACDCERT LISTCHAIN Syntax:
RACDCERT [ ID(certificate-owner)| SITE | CERTAUTH]
LISTCHAIN (LABEL('label-name'))
Information provided:
Certificate details for the specified certificate
Details for each issuing certificate which is in RACF
Summary of the Chain:
Number of certificates in the chain
Whether RACF contains the complete chain
Indication of expired certificate(s), if any
List of rings that all certificates in chain share
16
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RACDCERT LISTCHAIN Example
RACDCERT LISTCHAIN(LABEL(’samplecert’))
Certificate 1: Certificate 3:
Digital certificate information for user CHOI: Digital certificate information for CERTAUTH:
Label: samplecert Label: MasterCA
... ...
Ring Associations: Ring Associations:
Ring Owner: COOPER Ring Owner: COOPER
Ring: Ring:
>testring< >testring<
17
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RACDCERT CHECKCERT
RACDCERT CHECKCERT enhancement:
LISTCHAIN is used to list certificates in RACF, while CHECKCERT is
to list certificates in a dataset (which is going to be an input to the
RACDCERT ADD)
Enhancements similar to LISTCHAIN were added to the display text of
RACDCERT CHECKCERT, when displaying information on a
certificate in a dataset. Starting in V2.1, RACF is adding the ability to
list a certificate chain with the introduction of the RACDCERT
LISTCHAIN command.
18
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
RACDCERT GENREQ
Generating a Certificate Request (CSR) from RACDCERT GENREQ
requires an existing certificate in RACF with a private key (usually a
self signed certificate created with GENCERT).
Don't delete that cert!
A common issue encountered by RACDCERT users, is deleting the
original certificate from RACF after the CSR has been generated...
erroneously concluding that the certificate had no use.
If the original certificate is deleted from RACF after the CSR is created,
the private key is also deleted, rendering any signed certificate based
on this CSR useless (oops!).
Starting in V2R1 RACDCERT will prevent the deletion of a certificate
that has been used for generating a request with GENREQ.
Force override mechanism is provided to delete this certificate when
needed
19
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks
20
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: New and Updated Checks
RACF is planning on shipping these new checks in z/OS V2.1:
RACF_AIM_STAGE
RACF_UNIX_ID
RACF_CERTIFICATE_EXPIRATION
RACF_AIM_STAGE and RACF_UNIX_ID are intended to assist you in
migrating from BPX.DEFAULT.USER, which, as announced, is being
withdrawn with z/OS V2.1
These two checks rolled back to z/OS V1.12 and z/OS V1.13 with OA37164
Automatic start for the Health Checker address space at IPL time
21
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_AIM_STAGE
22
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_AIM_STAGE (OK)
Display Filter View Print Options Search Help
-------------------------------------------------------------------------------
SDSF OUTPUT DISPLAY RACF_AIM_STAGE LINE 0 COLUMNS 02- 81
COMMAND INPUT ===> SCROLL ===> HALF
********************************* TOP OF DATA **********************************
CHECK(IBMRACF,RACF_AIM_STAGE)
START TIME: 05/11/2012 14:36:29.892717
CHECK DATE: 20110101 CHECK SEVERITY: MEDIUM
23
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_AIM_STAGE (Exception)
Display Filter View Print Options Search Help
-------------------------------------------------------------------------------
SDSF OUTPUT DISPLAY RACF_AIM_STAGE LINE 0 COLUMNS 02- 81
COMMAND INPUT ===> SCROLL ===> HALF
********************************* TOP OF DATA **********************************
CHECK(IBMRACF,RACF_AIM_STAGE)
START TIME: 05/17/2012 16:42:53.891503
CHECK DATE: 20110101 CHECK SEVERITY: MEDIUM
24
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_UNIX_ID
The RACF_UNIX_ID Health Check determines whether RACF will
automatically assign unique z/OS UNIX System Services identities when
users without OMVS segments use certain UNIX services
If you are not relying on RACF to assign UIDs and GIDs, the check informs you
that you must continue to assign z/OS UNIX identities
If you are relying on the BPX.DEFAULT.USER support, the check issues an
exception
If you are relying on the BPX.UNIQUE.USER support, the check will verify
requirements and indicate if any exceptions are found
FACILITY class profile BPX.UNIQUE.USER must exist
RACF database must be at Application Identity Mapping (AIM) stage 3
UNIXPRIV class profile SHARED.IDS must be defined
UNIXPRIV class must be active and RACLISTed
FACILITY class profile BPX.NEXT.USER must be defined and its
APPLDATA field must contain valid ID values or ranges
Note: The check only lists the APPLDATA content, it does not validate it.
25
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_UNIX_ID (OK)
Display Filter View Print Options Search Help
-------------------------------------------------------------------------------
SDSF OUTPUT DISPLAY RACF_UNIX_ID LINE 0 COLUMNS 02- 81
COMMAND INPUT ===> SCROLL ===> HALF
********************************* TOP OF DATA **********************************
CHECK(IBMRACF,RACF_UNIX_ID)
START TIME: 05/18/2012 13:56:53.321238
CHECK DATE: 20110101 CHECK SEVERITY: MEDIUM
IRRH504I RACF is not enabled to assign UNIX IDs when users or groups
that do not have OMVS segments use certain z/OS UNIX services. If you
choose not to define UNIX IDs for each user of UNIX functions, you can
enable RACF to automatically generate unique UNIX UIDs and GIDs for you.
26
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_UNIX_ID (OK)
********************************* TOP OF DATA **********************************
CHECK(IBMRACF,RACF_UNIX_ID)
START TIME: 05/18/2012 14:12:18.914396
CHECK DATE: 20110101 CHECK SEVERITY: MEDIUM
IRRH502I RACF attempts to assign unique UNIX IDs when users or groups
that do not have OMVS segments use certain z/OS UNIX services.
S Requirement
- --------------------------------------------------------------------
FACILITY class profile BPX.UNIQUE.USER is defined
RACF database is at the required AIM stage:
AIM stage = 03
UNIXPRIV class profile SHARED.IDS is defined
UNIXPRIV class is active
UNIXPRIV class is RACLISTed
FACILITY class profile BPX.NEXT.USER is defined
BPX.NEXT.USER profile APPLDATA is specified (not verified):
APPLDATA = 1000/100
27
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_UNIX_ID (Exception)
Display Filter View Print Options Search Help
-------------------------------------------------------------------------------
SDSF OUTPUT DISPLAY RACF_UNIX_ID LINE 0 COLUMNS 02- 81
COMMAND INPUT ===> SCROLL ===> HALF
********************************* TOP OF DATA **********************************
CHECK(IBMRACF,RACF_UNIX_ID)
START TIME: 05/17/2012 16:45:01.400010
CHECK DATE: 20110101 CHECK SEVERITY: MEDIUM
IRRH502I RACF attempts to assign unique UNIX IDs when users or groups
that do not have OMVS segments use certain z/OS UNIX services.
S Requirement
- --------------------------------------------------------------------
FACILITY class profile BPX.UNIQUE.USER is defined
E RACF database is not at the required AIM stage:
AIM stage = 00
E UNIXPRIV class profile SHARED.IDS is not defined
E UNIXPRIV class is not active
E UNIXPRIV class is not RACLISTed
E FACILITY class profile BPX.NEXT.USER is not defined
IRRH503E RACF cannot assign unique UNIX IDs when users or groups that
do not have OMVS segments use certain z/OS UNIX services. One or more
requirements are not satisfied.
Explanation: The RACF UNIX identity check has determined that you
want RACF to assign unique UNIX IDs when users or groups without
OMVS segments use certain z/OS UNIX services. However, RACF is not
able to assign unique UNIX identities for z/OS UNIX services because
one or more of the following requirements are not satisfied:
28
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_UNIX_ID (Exception)
********************************* TOP OF DATA **********************************
CHECK(IBMRACF,RACF_UNIX_ID)
START TIME: 05/18/2012 14:22:52.066301
CHECK DATE: 20110101 CHECK SEVERITY: MEDIUM
Automation: None.
29
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_CERTIFICATE_EXPIRATION
The RACF_CERTIFICATE_EXPIRATION health check finds the
certificates in the RACF database expired or about to expire
Expiration window is an installation-defined value with a default of 60
days.
Valid expiration window values are 0-366 days
For each certificate, the check displays:
The certificate “owner” ('SITE', 'CERTAUTH', or 'ID(user_id)')
The certificate label
The end date
The trust status
The number of rings to which the certificate is connected
The check only flags as exceptions those certificates which are
TRUSTED.
30
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_CERTIFICATE_EXPIRATION (OK)
CHECK(IBMRACF,RACF_CERTIFICATE_EXPIRATION)
START TIME: 01/23/2012 08:10:01.603497
CHECK DATE: 20111010 CHECK SEVERITY: MEDIUM
31
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_CERTIFICATE_EXPIRATION (Exception)
CHECK(IBMRACF,RACF_CERTIFICATE_EXPIRATION)
START TIME: 02/28/2013 09:23:37.747549
CHECK DATE: 20111010 CHECK SEVERITY: MEDIUM
32
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_CERTIFICATE_EXPIRATION (Exception)
The RACF_CERTIFICATE_EXPIRATION check lists each certificate that
has an ending date prior to the current date or that has an ending
date that is prior to the current date adjusted by the warning
period that the installation has specified as a parameter to the
RACF_CERTIFICATE_EXPIRATION check. If a parameter is not specified,
a default warning period of 60 days is used.
Use the RACDCERT LIST command to list complete information about any
certificate. The RACDCERT command syntax is:
See z/OS Security Server RACF Security Administrator's Guide and the
z/OS Security Server RACF Command Language Reference for more
information about digital certificates.
33
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_SENSITIVE_RESOURCES
The RACF_SENSITIVE_RESOURCES check has been updated to
check these new “static” resources names:
BPX.DEBUG/FACILITY
BPX.WLMSERVER/FACILITY
IEAABD.DMPAKEY/FACILITY
MVS.SLIP/OPERCMDS
SUPERUSER.PROCESS.GETPSENT/UNIXPRIV
SUPERUSER.PROCESS.KILL/UNIXPRIV
SUPERUSER.PROCESS.PTRACE/UNIXPRIV
34
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_SENSITIVE_RESOURCES...
RACF is planning on updating the RACF_SENSITIVE_RESOURCES
to check these new “dynamic” resources names:
CSVAPF.data_set_name/FACILITY, excluding
CSVAPF.MVS.SETPROG.FORMAT.DYNAMIC
CSVDYLPA.ADD.module_name/FACILITY
CSVDYNEX.exit_name.function.modname/FACILITY, excluding
CSVDYNEX.LIST
CSVDYNEX.exit_name.RECOVER
CSVDYNEX.exit_name.CALL
CSVDYNL.lnklstname. Function/FACILITYexcluding
CSVDYNL.lnklstname.DEFINE CSVDYNL.lnklstname.UNDEFINE)
No validation is performed on the dynamic portion of these resource
names (for example data_set_ name, module_name,lnklstname)
35
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Health Checks: RACF_SENSITIVE_RESOURCES...
Sensitive General Resources Report
36
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
Certificate Distinguished Names in
IRRDBU00 Output
37
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
IRRDBU00: Additional Certificate Information
The RACF Database Unload Utility (IRRDBU00) unloads basic information about digital
certificates into the 0560 (“General Resource Certificate Data Record”). This record
contains:
The record type (“0560”)
The name of the general resource profile which contains the certificate
The class (“DIGTCERT”)
The date and time from which the certificate is valid
The date and time from which the certificate is no longer valid
The type of key associated with the certificate
The key size
The last eight bytes of the last certificate signed with this key
A sequence number for certificates within a ring
What's missing? The issuer's distinguished name (IDN) and the subject's DN (SDN)of
the certificate!
This information is encoded within the certificate
Maps/mungs to the profile name, but given the profile name, you can't get the IDN or
SDN
38
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
IRRDBU00: Additional Certificate Information...
A new record type (“1560”) is planned to contain:
The issuer's distinguished name
The subject's distinguished name
The hashing algorithm used for the signing the certificate
The “1560” record links to the “0560” record using the profile name
DFSORT's JOINKEY operator can be used when processing IRRDBU00 output
40
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
&RACUID in BPX.UNIQUE.USER
Clients who are using BPX.UNIQUE.USER to assign z/OS UNIX information
to user IDs will be able to specify of &racuid in the home directory field of
the model user's OMVS segment.
ALTUSER BPXMODEL OMVS(HOME(/u/&racuid))
The appropriate user ID will be substituted for &racuid when a new OMVS
segment is created for a user using BPX.UNIQUE.USER
In upper case if “&RACUID” is specified
In lower case if any lower case characters are specified
Notes
Only the first occurrence of &racuid is substituted
If the substitution would result in a path name exceeding the 1023 character
maximum then substitution is not performed.
If sharing the RACF database with a downlevel system, substitution will not be
performed on the downlevel system
41
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
JES2/JES3 SAF Check for Job Input
Class
42
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
JES2/JES3: SAF Check for Job Input Class
JES2 and JES3 are planning to perform a SAF check to verity a user's ability
to use a job class
Applied to both the “traditional” 36 single character classes as well as the
planned up-to-eight character job classes
Does not apply to the “special” job classes STC and TSU
The resource name that is checked is:
JESJOBS.nodename.jobclass.jobname
Controlled by these profiles:
JES.JOBCLASS.OWNER in the FACILITY class
If this profile is defined, then authorization checks are performed for job
owners
JES.JOBCLASS.SUBMITTER in the FACILITY class
If this profile is defined, then authorization checks are performed for job
submitters
43
Statements regarding IBM future direction and intent are subject to change or withdrawal, and represent goals and objectives only. © 2013 IBM Corporation
®
z/OS V2.1 RACF® Update